Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22555 (GCVE-0-2021-22555)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Linux Kernel |
Version: 2.6.19-rc1 < unspecified |
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2025-10-06
Due date: 2025-10-27
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https://security.netapp.com/advisory/ntap-20210805-0010/ ; https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22555
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:14.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-22555",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-04T03:55:24.534831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-10-06",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:25:41.821Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-06T00:00:00+00:00",
"value": "CVE-2021-22555 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Linux Kernel",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "2.6.19-rc1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Andy Nguyen"
}
],
"datePublic": "2021-07-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-06T19:06:15.000Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2021-07-04T10:00:00.000Z",
"ID": "CVE-2021-22555",
"STATE": "PUBLIC",
"TITLE": "Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "2.6.19-rc1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Andy Nguyen"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"refsource": "MISC",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210805-0010/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"name": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2021-22555",
"datePublished": "2021-07-07T11:20:10.668Z",
"dateReserved": "2021-01-05T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:25:41.821Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-22555",
"cwes": "[\"CWE-787\"]",
"dateAdded": "2025-10-06",
"dueDate": "2025-10-27",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https://security.netapp.com/advisory/ntap-20210805-0010/ ; https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"product": "Kernel",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.",
"vendorProject": "Linux",
"vulnerabilityName": "Linux Kernel Heap Out-of-Bounds Write Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22555\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2021-07-07T12:15:08.453\",\"lastModified\":\"2025-10-27T17:06:32.497\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space\"},{\"lang\":\"es\",\"value\":\"En el archivo net/netfilter/x_tables.c se ha detectado una escritura fuera de l\u00edmites en la pila que afecta a Linux desde la versi\u00f3n 2.6.19-rc1. Esto permite a un atacante alcanzar privilegios o causar una denegaci\u00f3n de servicio (por medio de corrupci\u00f3n de la memoria de la pila) mediante el espacio de nombres de usuario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2025-10-06\",\"cisaActionDue\":\"2025-10-27\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Linux Kernel Heap Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC7AD92-8B33-4137-A4EC-08641E4AF857\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD443748-B0D1-4C1A-A62E-BD5FB5967370\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1AB1EC2-2560-494A-A51B-6F20CE318FEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58DE2B52-4E49-4CD0-9310-00291B0352C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.19\",\"versionEndExcluding\":\"4.4.267\",\"matchCriteriaId\":\"3E869A37-B25A-4CFD-AFA1-964C540B7283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.267\",\"matchCriteriaId\":\"8F1C60CB-5594-496C-8DF0-68D909707254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.231\",\"matchCriteriaId\":\"C1285CF4-6285-4288-9981-03A04F93519E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.188\",\"matchCriteriaId\":\"46073F63-74D1-4675-999A-574C1C13B627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.113\",\"matchCriteriaId\":\"BB3CE52D-3245-4B6C-9C92-897BCB496882\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.31\",\"matchCriteriaId\":\"EB0A42D4-2DAC-4DE0-A20B-A2700AA5E63A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12\",\"matchCriteriaId\":\"66C052DB-C48A-43D4-A1A8-AF1E331199D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CD1160-B681-41EF-9EB4-06CE0F53C501\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5CDADAB-72A5-4526-8432-E6C9AC56B29F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E64576DE-90F0-4F5E-9C82-AB745CFEDBB7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF5AFE69-7990-4F80-9E63-D8AD58AA3A2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6415E28A-4EAC-4F7F-BD81-1A55CE8B6F40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FD9B9A-BBE5-4CA5-B9F9-B16E1FE738C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E70A56-DBA8-45C7-8C49-1A036501156F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578BB9A7-BF28-4068-A9A6-1DE19CEEC293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB58180-E5E0-4056-ABF9-A99E9F6A9E86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5921A877-18BF-43FE-915C-D226E140ACFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_baseboard_management_controller:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D878165F-5C16-4376-8058-28787C9FF923\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210805-0010/\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210805-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}"
}
}
CERTFR-2025-AVI-0893
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50229"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"name": "CVE-2022-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49969"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2023-53186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53186"
},
{
"name": "CVE-2023-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
},
{
"name": "CVE-2022-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49985"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2023-53373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53373"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50087"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2022-50228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50228"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
}
],
"initial_release_date": "2025-10-17T00:00:00",
"last_revision_date": "2025-10-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0893",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17735",
"url": "https://access.redhat.com/errata/RHSA-2025:17735"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18054",
"url": "https://access.redhat.com/errata/RHSA-2025:18054"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17397",
"url": "https://access.redhat.com/errata/RHSA-2025:17397"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17797",
"url": "https://access.redhat.com/errata/RHSA-2025:17797"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17734",
"url": "https://access.redhat.com/errata/RHSA-2025:17734"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18043",
"url": "https://access.redhat.com/errata/RHSA-2025:18043"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18098",
"url": "https://access.redhat.com/errata/RHSA-2025:18098"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17733",
"url": "https://access.redhat.com/errata/RHSA-2025:17733"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17776",
"url": "https://access.redhat.com/errata/RHSA-2025:17776"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17958",
"url": "https://access.redhat.com/errata/RHSA-2025:17958"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17812",
"url": "https://access.redhat.com/errata/RHSA-2025:17812"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17760",
"url": "https://access.redhat.com/errata/RHSA-2025:17760"
}
]
}
CERTFR-2021-AVI-584
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
}
],
"initial_release_date": "2021-08-02T00:00:00",
"last_revision_date": "2021-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212577-1 du 30 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
}
],
"initial_release_date": "2023-01-23T00:00:00",
"last_revision_date": "2023-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-635
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-08-18T00:00:00",
"last_revision_date": "2021-08-18T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-635",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5044-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5044-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0080-1 du 16 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/LSN-0080-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5046-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5046-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5045-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5045-1"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"initial_release_date": "2021-10-15T00:00:00",
"last_revision_date": "2021-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-595
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"initial_release_date": "2021-08-04T00:00:00",
"last_revision_date": "2021-08-04T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-1 du 03 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-1/"
}
]
}
CERTFR-2021-AVI-585
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-08-03T00:00:00",
"last_revision_date": "2021-08-03T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212584-1 du 02 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
}
]
}
CERTFR-2021-AVI-752
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-10-06T00:00:00",
"last_revision_date": "2021-10-06T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-752",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3725 du 05 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
}
]
}
CERTFR-2021-AVI-720
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-21T00:00:00",
"last_revision_date": "2021-09-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-720",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:3522 du 14 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
]
}
CERTFR-2021-AVI-602
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"initial_release_date": "2021-08-06T00:00:00",
"last_revision_date": "2021-08-06T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-602",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-2 du 05 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-2/"
}
]
}
CERTFR-2021-AVI-581
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-07-28T00:00:00",
"last_revision_date": "2021-07-30T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-581",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-28T00:00:00.000000"
},
{
"description": "Ajout des syst\u00e8mes affect\u00e9s et des bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 et suse-su-20212560-1 du 29 juillet 2021.",
"revision_date": "2021-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212542-1 du 28 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212560-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212538-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212487-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
}
]
}
CERTFR-2021-AVI-611
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-08-11T00:00:00",
"last_revision_date": "2021-08-11T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3088 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3057 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
}
]
}
CERTFR-2021-AVI-680
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-08T00:00:00",
"last_revision_date": "2021-09-08T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-680",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3446 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3446"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3445 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3445"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3444 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3447 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3447"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3440 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3440"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3363 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
}
]
}
CERTFR-2021-AVI-640
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-08-19T00:00:00",
"last_revision_date": "2021-08-19T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-640",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3173 du 17 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
}
]
}
CERTFR-2021-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-01T00:00:00",
"last_revision_date": "2021-09-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
]
}
CERTFR-2021-AVI-786
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"initial_release_date": "2021-10-14T00:00:00",
"last_revision_date": "2021-10-14T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-786",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3812 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3766 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3801 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3802 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3802"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-550
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-550",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212415-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212408-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212407-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212416-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
}
]
}
CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2022-22238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
},
{
"name": "CVE-2022-22249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2022-22208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2018-20532",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
},
{
"name": "CVE-2022-22246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2022-22250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
},
{
"name": "CVE-2022-22192",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2022-22239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2022-22229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
},
{
"name": "CVE-2018-20534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2022-22245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2018-10689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2022-22232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-22240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
},
{
"name": "CVE-2022-22242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2022-22251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2022-22244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2022-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2018-20533",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2022-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-22199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-22236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2022-22248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2022-22220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2022-22223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-2684",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
},
{
"name": "CVE-2021-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2022-22231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-22211",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2022-22230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
},
{
"name": "CVE-2022-22237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
}
],
"initial_release_date": "2022-10-13T00:00:00",
"last_revision_date": "2022-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
}
]
}
CERTFR-2021-AVI-628
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans le noyau Linux d'Ubuntu. Elle permet à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-08-13T00:00:00",
"last_revision_date": "2021-08-13T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-628",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux d\u0027Ubuntu. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et\nun d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5039-1 du 12 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5039-1"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"initial_release_date": "2021-12-01T00:00:00",
"last_revision_date": "2021-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-612
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-08-11T00:00:00",
"last_revision_date": "2021-08-11T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-612",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212645-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212645-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212643-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212644-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212644-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212647-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212647-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212646-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212646-1/"
}
]
}
CERTFR-2021-AVI-699
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"initial_release_date": "2021-09-14T00:00:00",
"last_revision_date": "2021-09-14T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-699",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0081-1 du 13 septembre 2021",
"url": "https://ubuntu.com/security/notices/LSN-0081-1"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-22T00:00:00",
"last_revision_date": "2021-07-22T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
suse-su-2021:2584-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_72 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2584,SUSE-SLE-Live-Patching-12-SP4-2021-2584,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2585",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2584-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2584-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2584-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2021-08-02T07:44:17Z",
"generator": {
"date": "2021-08-02T07:44:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2584-1",
"initial_release_date": "2021-08-02T07:44:17Z",
"revision_history": [
{
"date": "2021-08-02T07:44:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2438-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).\n- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch\n- fix patches metadata\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2438,SUSE-SLE-Module-Basesystem-15-SP2-2021-2438,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2438,SUSE-SLE-Module-Legacy-15-SP2-2021-2438,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2438,SUSE-SLE-Product-HA-15-SP2-2021-2438,SUSE-SLE-Product-WE-15-SP2-2021-2438,SUSE-SUSE-MicroOS-5.0-2021-2438",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2438-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2438-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2438-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T11:46:47Z",
"generator": {
"date": "2021-07-21T11:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2438-1",
"initial_release_date": "2021-07-21T11:46:47Z",
"revision_history": [
{
"date": "2021-07-21T11:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.75.2.noarch",
"product_id": "kernel-devel-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.75.2.noarch",
"product_id": "kernel-docs-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.75.2.noarch",
"product_id": "kernel-docs-html-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.75.2.noarch",
"product_id": "kernel-macros-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-source-5.3.18-24.75.2.noarch",
"product_id": "kernel-source-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.75.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.75.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-devel-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-extra-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.s390x",
"product_id": "kernel-obs-build-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.s390x",
"product_id": "kernel-syms-5.3.18-24.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.75.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.75.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.75.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-source-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2407-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bnc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges (bsc#1188062).\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation (bsc#1187050).\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: flexcan: disable completely the ECC mechanism (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: xilinx_can: xcan_chip_start(): fix failure with invalid bus (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (12sp5).\n- cxgb4: fix wrong shift (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mlxsw: spectrum: Do not process learned records with a dummy FID (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net: dsa: qca8k: Use up to 7 ports for all operations (git-fixes).\n- net: stmmac: Correctly take timestamp for PTPv2 (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1188010).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2407,SUSE-SLE-SERVER-12-SP5-2021-2407",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2407-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2407-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2407-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188010",
"url": "https://bugzilla.suse.com/1188010"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:21Z",
"generator": {
"date": "2021-07-20T12:40:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2407-1",
"initial_release_date": "2021-07-20T12:40:21Z",
"revision_history": [
{
"date": "2021-07-20T12:40:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.65.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.65.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.65.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2577-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)\n- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)\n- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)\n- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)\n- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)\n- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)\n- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)\n- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2577,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2577-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2577-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2577-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-07-30T15:51:38Z",
"generator": {
"date": "2021-07-30T15:51:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2577-1",
"initial_release_date": "2021-07-30T15:51:38Z",
"revision_history": [
{
"date": "2021-07-30T15:51:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
}
]
}
suse-su-2021:2560-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2560,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2560,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2561",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2560-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2560-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2560-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2021-07-29T11:24:43Z",
"generator": {
"date": "2021-07-29T11:24:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2560-1",
"initial_release_date": "2021-07-29T11:24:43Z",
"revision_history": [
{
"date": "2021-07-29T11:24:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2408-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges (bsc#1188062).\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- Blacklist already cherry-picked ASoC commits\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify and fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- UsrMerge the kernel (boo#1184804)\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2408,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2408-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2408-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2408-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:34Z",
"generator": {
"date": "2021-07-20T12:40:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2408-1",
"initial_release_date": "2021-07-20T12:40:34Z",
"revision_history": [
{
"date": "2021-07-20T12:40:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.58.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.58.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.58.1.noarch",
"product_id": "kernel-source-azure-5.3.18-18.58.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2542-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_49 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2542,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2541,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2542,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2543,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2542-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2542-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2542-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-07-28T07:05:43Z",
"generator": {
"date": "2021-07-28T07:05:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2542-1",
"initial_release_date": "2021-07-28T07:05:43Z",
"revision_history": [
{
"date": "2021-07-28T07:05:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2599-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472) Backporting changes: \t* context changes\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489) Backporting changes: \t* context changes\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472) Backporting changes: \t* unsigned long -\u003e uint32_t\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472) Backporting changes: \t* only panel-samsung-s6d16d0.c exists\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489) Backporting changes: \t* context changes \t* GEM_WARN_ON() -\u003e WARN_ON()\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489) Backporting changes: \t* context changes\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489) Backporting changes: \t* context changes \t* vc4_hdmi -\u003e vc4-\u003ehdmi\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- mac80211: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme: fix in-casule data send for chained sgls (git-fixes).\n- nvme: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- tcp: Remove superfluous BH-disable around listening_hash (bsc#1188525).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify and fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- Update patches.suse/Revert-ibmvnic-remove-duplicate-napi_schedule-call-i.patch (bsc#1065729 bsc#1188405 ltc#193509).\n- Update patches.suse/Revert-ibmvnic-simplify-reset_long_term_buff-functio.patch (bsc#1186206 ltc#191041 bsc#1188405 ltc#193509).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- UsrMerge the kernel (boo#1184804)\n- vfio: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2599,SUSE-SUSE-MicroOS-5.0-2021-2599",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2599-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2599-2",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2599-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1180092",
"url": "https://bugzilla.suse.com/1180092"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188525",
"url": "https://bugzilla.suse.com/1188525"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-08-05T08:24:13Z",
"generator": {
"date": "2021-08-05T08:24:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2599-2",
"initial_release_date": "2021-08-05T08:24:13Z",
"revision_history": [
{
"date": "2021-08-05T08:24:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-45.3.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-45.3.noarch",
"product_id": "kernel-devel-rt-5.3.18-45.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-45.3.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-45.3.noarch",
"product_id": "kernel-source-rt-5.3.18-45.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-extra-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-45.2.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-45.2.x86_64",
"product_id": "kernel-syms-rt-5.3.18-45.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-45.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
},
"product_reference": "kernel-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-05T08:24:13Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-05T08:24:13Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-05T08:24:13Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-05T08:24:13Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2415-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nSecurity issues fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2415,SUSE-SLE-Module-Basesystem-15-SP3-2021-2415,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2415,SUSE-SLE-Module-Legacy-15-SP3-2021-2415,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2415,SUSE-SLE-Product-HA-15-SP3-2021-2415,SUSE-SLE-Product-WE-15-SP3-2021-2415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2415-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2415-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2415-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:12:08Z",
"generator": {
"date": "2021-07-20T14:12:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2415-1",
"initial_release_date": "2021-07-20T14:12:08Z",
"revision_history": [
{
"date": "2021-07-20T14:12:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-59.16.1.aarch64",
"product_id": "dtb-al-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-59.16.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-59.16.1.aarch64",
"product_id": "dtb-altera-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-59.16.1.aarch64",
"product_id": "dtb-amd-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-59.16.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-59.16.1.aarch64",
"product_id": "dtb-apm-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-59.16.1.aarch64",
"product_id": "dtb-arm-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-59.16.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-59.16.1.aarch64",
"product_id": "dtb-cavium-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-59.16.1.aarch64",
"product_id": "dtb-exynos-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-59.16.1.aarch64",
"product_id": "dtb-freescale-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-59.16.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-59.16.1.aarch64",
"product_id": "dtb-lg-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-59.16.1.aarch64",
"product_id": "dtb-marvell-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-59.16.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-59.16.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-59.16.1.aarch64",
"product_id": "dtb-qcom-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-59.16.1.aarch64",
"product_id": "dtb-renesas-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-59.16.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-59.16.1.aarch64",
"product_id": "dtb-socionext-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-59.16.1.aarch64",
"product_id": "dtb-sprd-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-59.16.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-59.16.1.aarch64",
"product_id": "dtb-zte-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product_id": "kernel-devel-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product_id": "kernel-macros-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product_id": "kernel-syms-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:12:08Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:12:08Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2409-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2409,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2409",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2409-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2409-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212409-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2409-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:51Z",
"generator": {
"date": "2021-07-20T12:40:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2409-1",
"initial_release_date": "2021-07-20T12:40:51Z",
"revision_history": [
{
"date": "2021-07-20T12:40:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:51Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:51Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2538-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.180-94_127 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2538,SUSE-SLE-Live-Patching-12-SP4-2021-2529,SUSE-SLE-Live-Patching-12-SP4-2021-2530,SUSE-SLE-Live-Patching-12-SP4-2021-2531,SUSE-SLE-Live-Patching-12-SP4-2021-2532,SUSE-SLE-Live-Patching-12-SP4-2021-2533,SUSE-SLE-Live-Patching-12-SP4-2021-2534,SUSE-SLE-Live-Patching-12-SP5-2021-2515,SUSE-SLE-Live-Patching-12-SP5-2021-2516,SUSE-SLE-Live-Patching-12-SP5-2021-2517,SUSE-SLE-Live-Patching-12-SP5-2021-2518,SUSE-SLE-Live-Patching-12-SP5-2021-2519,SUSE-SLE-Live-Patching-12-SP5-2021-2520,SUSE-SLE-Live-Patching-12-SP5-2021-2521,SUSE-SLE-Live-Patching-12-SP5-2021-2522,SUSE-SLE-Live-Patching-12-SP5-2021-2523,SUSE-SLE-Live-Patching-12-SP5-2021-2524,SUSE-SLE-Live-Patching-12-SP5-2021-2525,SUSE-SLE-Live-Patching-12-SP5-2021-2526,SUSE-SLE-Live-Patching-12-SP5-2021-2527,SUSE-SLE-Live-Patching-12-SP5-2021-2528,SUSE-SLE-Module-Live-Patching-15-2021-2509,SUSE-SLE-Module-Live-Patching-15-2021-2510,SUSE-SLE-Module-Live-Patching-15-2021-2511,SUSE-SLE-Module-Live-Patching-15-2021-2512,SUSE-SLE-Module-Live-Patching-15-2021-2513,SUSE-SLE-Module-Live-Patching-15-2021-2514,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2500,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2501,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2502,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2503,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2504,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2505,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2506,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2507,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2508,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2488,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2489,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2490,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2491,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2492,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2493,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2494,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2495,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2496,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2497,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2498,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2499,SUSE-SLE-SAP-12-SP3-2021-2535,SUSE-SLE-SAP-12-SP3-2021-2536,SUSE-SLE-SAP-12-SP3-2021-2537,SUSE-SLE-SAP-12-SP3-2021-2538,SUSE-SLE-SAP-12-SP3-2021-2539,SUSE-SLE-SAP-12-SP3-2021-2540,SUSE-SLE-SERVER-12-SP3-2021-2535,SUSE-SLE-SERVER-12-SP3-2021-2536,SUSE-SLE-SERVER-12-SP3-2021-2537,SUSE-SLE-SERVER-12-SP3-2021-2538,SUSE-SLE-SERVER-12-SP3-2021-2539,SUSE-SLE-SERVER-12-SP3-2021-2540",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2538-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2538-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2538-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)",
"tracking": {
"current_release_date": "2021-07-27T15:37:16Z",
"generator": {
"date": "2021-07-27T15:37:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2538-1",
"initial_release_date": "2021-07-27T15:37:16Z",
"revision_history": [
{
"date": "2021-07-27T15:37:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2421-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2421-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2421-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:01:19Z",
"generator": {
"date": "2021-07-21T09:01:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2421-1",
"initial_release_date": "2021-07-21T09:01:19Z",
"revision_history": [
{
"date": "2021-07-21T09:01:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product_id": "kernel-devel-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product_id": "kernel-macros-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product_id": "kernel-syms-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2406-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2406,SUSE-SLE-SERVER-12-SP2-BCL-2021-2406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2406-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2406-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:03Z",
"generator": {
"date": "2021-07-20T12:40:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2406-1",
"initial_release_date": "2021-07-20T12:40:03Z",
"revision_history": [
{
"date": "2021-07-20T12:40:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product_id": "kernel-devel-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product_id": "kernel-macros-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.158.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product_id": "kernel-syms-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2599-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472) Backporting changes: \t* context changes\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489) Backporting changes: \t* context changes\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472) Backporting changes: \t* unsigned long -\u003e uint32_t\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472) Backporting changes: \t* only panel-samsung-s6d16d0.c exists\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489) Backporting changes: \t* context changes \t* GEM_WARN_ON() -\u003e WARN_ON()\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489) Backporting changes: \t* context changes\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489) Backporting changes: \t* context changes \t* vc4_hdmi -\u003e vc4-\u003ehdmi\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- mac80211: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme: fix in-casule data send for chained sgls (git-fixes).\n- nvme: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- tcp: Remove superfluous BH-disable around listening_hash (bsc#1188525).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify and fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- Update patches.suse/Revert-ibmvnic-remove-duplicate-napi_schedule-call-i.patch (bsc#1065729 bsc#1188405 ltc#193509).\n- Update patches.suse/Revert-ibmvnic-simplify-reset_long_term_buff-functio.patch (bsc#1186206 ltc#191041 bsc#1188405 ltc#193509).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- UsrMerge the kernel (boo#1184804)\n- vfio: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2599,SUSE-SLE-Module-RT-15-SP2-2021-2599",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2599-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2599-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2599-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1180092",
"url": "https://bugzilla.suse.com/1180092"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188525",
"url": "https://bugzilla.suse.com/1188525"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-08-03T12:46:44Z",
"generator": {
"date": "2021-08-03T12:46:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2599-1",
"initial_release_date": "2021-08-03T12:46:44Z",
"revision_history": [
{
"date": "2021-08-03T12:46:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-45.3.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-45.3.noarch",
"product_id": "kernel-devel-rt-5.3.18-45.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-45.3.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-45.3.noarch",
"product_id": "kernel-source-rt-5.3.18-45.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-extra-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-45.2.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-45.2.x86_64",
"product_id": "kernel-syms-rt-5.3.18-45.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-45.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-45.3.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-45.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-45.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-45.3.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-45.3.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64"
},
"product_reference": "kernel-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-45.3.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-45.3.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-45.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-45.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-45.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-45.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-03T12:46:44Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-03T12:46:44Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-03T12:46:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-45.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-45.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-45.2.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-45.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-03T12:46:44Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2643-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038).\n- CVE-2021-22543: Fixed an improper handling of VM_IO|VM_PFNMAP vmas in KVM that allows users to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (bnc#1186482)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188750).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-\u003eprepath (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- crypto: do not free algorithm before using (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix wrong shift (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add NULL pointer checks when freeing irqs (bsc#1176940).\n- gve: Add basic driver framework for Compute Engine Virtual NIC (jsc#SLE-10538).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add ethtool support (jsc#SLE-10538).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Add workqueue and reset support (jsc#SLE-10538).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: Copy and paste bug in gve_get_stats() (jsc#SLE-10538).\n- gve: Correct SKB queue index validation (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (bsc#1176940).\n- gve: Fix case where desc_cnt and data_cnt can get out of sync (jsc#SLE-10538).\n- gve: Fix error return code in gve_alloc_qpls() (jsc#SLE-10538).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix the queue page list allocated pages count (bsc#1176940).\n- gve: Fix u64_stats_sync to initialize start (jsc#SLE-10538).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Fixes DMA synchronization (jsc#SLE-10538).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Remove the exporting of gve_probe (jsc#SLE-10538).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Update mgmt_msix_idx if num_ntfy changes (bsc#1176940).\n- gve: Upgrade memory barrier in poll routine (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: fix -ENOMEM null check on a page allocation (jsc#SLE-10538).\n- gve: fix dma sync bug where not all pages synced (bsc#1176940).\n- gve: fix unused variable/label warnings (jsc#SLE-10538).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: replace kfree with kvfree (jsc#SLE-10538).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- kabi: fix nvme_wait_freeze_timeout() return type (bsc#1181161).\n- kfifo: DECLARE_KIFO_PTR(fifo, u64) does not work on arm 32 bit (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: Google gve: Remove dma_wmb() before ringing doorbell (bsc#1176940).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1181161).\n- nvme-multipath: fix double initialization of ANA state (bsc#1181161).\n- nvme-rdma: add clean action for failed reconnection (bsc#1181161).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1181161).\n- nvme-rdma: use cancel tagset helper for tear down (bsc#1181161).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1181161).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- nvmet: use new ana_log_size instead the old one (bsc#1181161).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries/scm: Use a specific endian format for storing uuid from the device tree (bsc#1113295, git-fixes).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc: fix missing unlock on error in usbip_sockfd_store() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2643,SUSE-SLE-RT-12-SP5-2021-2643",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2643-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2643-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2643-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1176931",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187476",
"url": "https://bugzilla.suse.com/1187476"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187846",
"url": "https://bugzilla.suse.com/1187846"
},
{
"category": "self",
"summary": "SUSE Bug 1188026",
"url": "https://bugzilla.suse.com/1188026"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188101",
"url": "https://bugzilla.suse.com/1188101"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188620",
"url": "https://bugzilla.suse.com/1188620"
},
{
"category": "self",
"summary": "SUSE Bug 1188750",
"url": "https://bugzilla.suse.com/1188750"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188842",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1188973",
"url": "https://bugzilla.suse.com/1188973"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-08-10T08:03:06Z",
"generator": {
"date": "2021-08-10T08:03:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2643-1",
"initial_release_date": "2021-08-10T08:03:06Z",
"revision_history": [
{
"date": "2021-08-10T08:03:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.54.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.54.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.54.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.54.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.54.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
}
]
}
suse-su-2021:2487-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2487,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2487,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2484,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2485,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2486",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2487-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2487-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2487-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2021-07-27T15:25:57Z",
"generator": {
"date": "2021-07-27T15:25:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2487-1",
"initial_release_date": "2021-07-27T15:25:57Z",
"revision_history": [
{
"date": "2021-07-27T15:25:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:25:57Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:25:57Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2422-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610 bnc#1186463).\n- CVE-2021-34693: net/can/bcm.c allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n\nThe following non-security bugs were fixed:\n\n- block: do not use blocking queue entered for recursive bio (bsc#1104967).\n- s390/stack: fix possible register corruption with stack switch helper (git-fixes).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2422,SUSE-OpenStack-Cloud-9-2021-2422,SUSE-OpenStack-Cloud-Crowbar-9-2021-2422,SUSE-SLE-HA-12-SP4-2021-2422,SUSE-SLE-Live-Patching-12-SP4-2021-2422,SUSE-SLE-SAP-12-SP4-2021-2422,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2422",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2422-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:02:38Z",
"generator": {
"date": "2021-07-21T09:02:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2422-1",
"initial_release_date": "2021-07-21T09:02:38Z",
"revision_history": [
{
"date": "2021-07-21T09:02:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product_id": "kernel-devel-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product_id": "kernel-macros-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product_id": "kernel-syms-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2451-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).\n- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).\n- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).\n- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).\n- hv_netvsc: common detach logic (bsc#1175462).\n- hv_netvsc: delay setup of VF device (bsc#1175462).\n- hv_netvsc: disable NAPI before channel close (bsc#1175462).\n- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).\n- hv_netvsc: fix deadlock on hotplug (bsc#1175462).\n- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).\n- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).\n- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).\n- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).\n- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).\n- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).\n- hv_netvsc: fix race during initialization (bsc#1175462).\n- hv_netvsc: fix race on sub channel creation (bsc#1175462).\n- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).\n- hv_netvsc: fix schedule in RCU context (bsc#1175462).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).\n- hv_netvsc: flag software created hash value (bsc#1175462).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).\n- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).\n- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).\n- hv_netvsc: set master device (bsc#1175462).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).\n- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).\n- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).\n- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).\n- scsi: storvsc: Enable scatterlist entry lengths \u003e 4Kbytes (bsc#1187193).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-2451,SUSE-2021-2451,SUSE-OpenStack-Cloud-8-2021-2451,SUSE-OpenStack-Cloud-Crowbar-8-2021-2451,SUSE-SLE-HA-12-SP3-2021-2451,SUSE-SLE-SAP-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-BCL-2021-2451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2451-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2451-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2451-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1175462",
"url": "https://bugzilla.suse.com/1175462"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187193",
"url": "https://bugzilla.suse.com/1187193"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187388",
"url": "https://bugzilla.suse.com/1187388"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T11:16:06Z",
"generator": {
"date": "2021-07-22T11:16:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2451-1",
"initial_release_date": "2021-07-22T11:16:06Z",
"revision_history": [
{
"date": "2021-07-22T11:16:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product_id": "kernel-devel-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product_id": "kernel-macros-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.147.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product_id": "kernel-syms-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2416-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- cxgb4: fix wrong shift (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\u003e\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2416,SUSE-SLE-HA-12-SP5-2021-2416,SUSE-SLE-Live-Patching-12-SP5-2021-2416,SUSE-SLE-SDK-12-SP5-2021-2416,SUSE-SLE-SERVER-12-SP5-2021-2416,SUSE-SLE-WE-12-SP5-2021-2416",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2416-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2416-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2416-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:13:25Z",
"generator": {
"date": "2021-07-20T14:13:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2416-1",
"initial_release_date": "2021-07-20T14:13:25Z",
"revision_history": [
{
"date": "2021-07-20T14:13:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.80.1.noarch",
"product_id": "kernel-devel-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.80.1.noarch",
"product_id": "kernel-docs-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.80.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.80.1.noarch",
"product_id": "kernel-macros-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.80.1.noarch",
"product_id": "kernel-source-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.80.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.s390x",
"product_id": "kernel-syms-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.80.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2427-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2427,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2427,SUSE-SLE-Product-HA-15-SP1-2021-2427,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2427,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2427,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2427,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2427,SUSE-Storage-6-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2427-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2427-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:29:05Z",
"generator": {
"date": "2021-07-21T09:29:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:29:05Z",
"revision_history": [
{
"date": "2021-07-21T09:29:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product_id": "kernel-devel-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product_id": "kernel-macros-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.99.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product_id": "kernel-syms-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2559-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_10 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2559,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2559",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2559-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2559-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2559-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2021-07-29T11:24:20Z",
"generator": {
"date": "2021-07-29T11:24:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2559-1",
"initial_release_date": "2021-07-29T11:24:20Z",
"revision_history": [
{
"date": "2021-07-29T11:24:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:20Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:20Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
RHSA-2021:3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:12+00:00",
"generator": {
"date": "2025-10-10T19:53:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3088
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3088",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3088",
"initial_release_date": "2021-08-10T13:17:32+00:00",
"revision_history": [
{
"date": "2021-08-10T13:17:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:17:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021_3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:32+00:00",
"generator": {
"date": "2024-11-15T11:55:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:00+00:00",
"generator": {
"date": "2024-11-15T11:55:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3235
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3235",
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1975177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1989397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2024-11-22T17:14:33+00:00",
"generator": {
"date": "2024-11-22T17:14:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3235",
"initial_release_date": "2021-08-19T15:51:36+00:00",
"revision_history": [
{
"date": "2021-08-19T15:51:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-19T15:51:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:14:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product_id": "imgbased-0:1.2.23-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"acknowledgments": [
{
"names": [
"Laszlo Ersek"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-38575",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956284"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38575"
},
{
"category": "external",
"summary": "RHBZ#1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
}
]
}
rhsa-2021_3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T17:16:18+00:00",
"generator": {
"date": "2024-11-22T17:16:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:16:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021_3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:30+00:00",
"generator": {
"date": "2024-11-15T11:55:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:12+00:00",
"generator": {
"date": "2025-10-10T19:53:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2024-11-15T11:55:51+00:00",
"generator": {
"date": "2024-11-15T11:55:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 therefore this flaw has been rated as having moderate impact for Red Hat Enterprise linux 8. RHEL 9 is not vulnerable but is affected, because it is not default configured to run as root.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021:3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3235
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3235",
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1975177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1989397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3235",
"initial_release_date": "2021-08-19T15:51:36+00:00",
"revision_history": [
{
"date": "2021-08-19T15:51:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-19T15:51:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product_id": "imgbased-0:1.2.23-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"acknowledgments": [
{
"names": [
"Laszlo Ersek"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-38575",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956284"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38575"
},
{
"category": "external",
"summary": "RHBZ#1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
}
]
}
rhsa-2021:3044
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3044",
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3044",
"initial_release_date": "2021-08-10T11:21:13+00:00",
"revision_history": [
{
"date": "2021-08-10T11:21:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T11:21:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3057
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3057",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3057",
"initial_release_date": "2021-08-10T13:19:09+00:00",
"revision_history": [
{
"date": "2021-08-10T13:19:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:19:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021_3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:56:11+00:00",
"generator": {
"date": "2024-11-15T11:56:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3044
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3044",
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3044",
"initial_release_date": "2021-08-10T11:21:13+00:00",
"revision_history": [
{
"date": "2021-08-10T11:21:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T11:21:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3814
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3814",
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:14+00:00",
"generator": {
"date": "2025-10-10T19:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3814",
"initial_release_date": "2021-10-12T15:14:01+00:00",
"revision_history": [
{
"date": "2021-10-12T15:14:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:14:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021:3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:09+00:00",
"generator": {
"date": "2025-10-10T19:53:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021_3814
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3814",
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-22T17:15:45+00:00",
"generator": {
"date": "2024-11-22T17:15:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3814",
"initial_release_date": "2021-10-12T15:14:01+00:00",
"revision_history": [
{
"date": "2021-10-12T15:14:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:14:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:15:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
RHSA-2021:3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:07+00:00",
"generator": {
"date": "2025-10-10T19:53:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3235
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3235",
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1975177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1989397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3235",
"initial_release_date": "2021-08-19T15:51:36+00:00",
"revision_history": [
{
"date": "2021-08-19T15:51:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-19T15:51:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product_id": "imgbased-0:1.2.23-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"acknowledgments": [
{
"names": [
"Laszlo Ersek"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-38575",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956284"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38575"
},
{
"category": "external",
"summary": "RHBZ#1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
}
]
}
rhsa-2021_3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:56:04+00:00",
"generator": {
"date": "2024-11-15T11:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T11:55:09+00:00",
"generator": {
"date": "2024-11-15T11:55:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3814
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3814",
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3814.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:14+00:00",
"generator": {
"date": "2025-10-10T19:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3814",
"initial_release_date": "2021-10-12T15:14:01+00:00",
"revision_history": [
{
"date": "2021-10-12T15:14:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:14:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:14:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021:3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:05+00:00",
"generator": {
"date": "2024-11-15T11:55:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2025-10-17T17:27:32+00:00",
"generator": {
"date": "2025-10-17T17:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-17T17:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated with an important severity as it allows an attacker to inject X11 protocol commands on X clients with the privileges of the application linked with the libX11 library, potentially having administrative privileges. However, Red Hat Enterprise Linux 8 and 9 do not run the Xorg server with root privileges, lowering the security impact of this issue. For this reason, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation -\u003e CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality and least privilege to ensure that only essential services, features, and ports are enabled, reducing the attack surface and exposure to input-driven or command injection vulnerabilities. Secure baseline configurations are established during system design, and CI/CD pipelines enforce security through SAST/DAST testing, restricted command execution, and mandatory peer reviews for manual code promotions. Input validation is consistently applied across all services within the system boundary to prevent improper handling of untrusted data. Process isolation ensures that components handling external input operate in separate execution domains, containing potential impact. Malicious code protections, including IDS and IPS, work with real-time monitoring to detect and respond to exploitation attempts. Centralized logging supports correlation, alerting, and anomaly detection, while robust error handling further reduces the risk of system instability or data exposure resulting from unvalidated input or improper command execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3088
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3088",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:54:17+00:00",
"generator": {
"date": "2024-11-15T11:54:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3088",
"initial_release_date": "2021-08-10T13:17:32+00:00",
"revision_history": [
{
"date": "2021-08-10T13:17:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:17:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:54:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021_3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:14+00:00",
"generator": {
"date": "2024-11-15T11:55:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:17+00:00",
"generator": {
"date": "2024-11-15T11:55:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2025:17733
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17733",
"url": "https://access.redhat.com/errata/RHSA-2025:17733"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17733.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T22:52:33+00:00",
"generator": {
"date": "2025-10-10T22:52:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:17733",
"initial_release_date": "2025-10-10T19:52:47+00:00",
"revision_history": [
{
"date": "2025-10-10T19:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-10T19:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T22:52:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product": {
"name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.58.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.58.1.el6.src",
"product_id": "kernel-0:2.6.32-754.58.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.58.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.58.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.58.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.58.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.58.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.58.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.58.1.el6.i686",
"product_id": "perf-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.58.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.58.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.58.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.58.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.58.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.58.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.58.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.58.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.58.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.58.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.58.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.58.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.58.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.58.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.src as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.src",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.src as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.src",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-10T19:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17733"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.src",
"6Server-optional-ELS.EXTENSION:kernel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-abi-whitelists-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debug-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-i686-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-s390x-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-debuginfo-common-x86_64-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-devel-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:kernel-doc-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-firmware-0:2.6.32-754.58.1.el6.noarch",
"6Server-optional-ELS.EXTENSION:kernel-kdump-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:kernel-kdump-devel-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-0:2.6.32-754.58.1.el6.x86_64",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.i686",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.s390x",
"6Server-optional-ELS.EXTENSION:python-perf-debuginfo-0:2.6.32-754.58.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2025-10-17T17:27:32+00:00",
"generator": {
"date": "2025-10-17T17:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-17T17:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated with an important severity as it allows an attacker to inject X11 protocol commands on X clients with the privileges of the application linked with the libX11 library, potentially having administrative privileges. However, Red Hat Enterprise Linux 8 and 9 do not run the Xorg server with root privileges, lowering the security impact of this issue. For this reason, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation -\u003e CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality and least privilege to ensure that only essential services, features, and ports are enabled, reducing the attack surface and exposure to input-driven or command injection vulnerabilities. Secure baseline configurations are established during system design, and CI/CD pipelines enforce security through SAST/DAST testing, restricted command execution, and mandatory peer reviews for manual code promotions. Input validation is consistently applied across all services within the system boundary to prevent improper handling of untrusted data. Process isolation ensures that components handling external input operate in separate execution domains, containing potential impact. Malicious code protections, including IDS and IPS, work with real-time monitoring to detect and respond to exploitation attempts. Centralized logging supports correlation, alerting, and anomaly detection, while robust error handling further reduces the risk of system instability or data exposure resulting from unvalidated input or improper command execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3057
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3057",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T11:54:35+00:00",
"generator": {
"date": "2024-11-15T11:54:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3057",
"initial_release_date": "2021-08-10T13:19:09+00:00",
"revision_history": [
{
"date": "2021-08-10T13:19:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:19:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:54:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021:3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:09+00:00",
"generator": {
"date": "2025-10-10T19:53:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:52+00:00",
"generator": {
"date": "2024-11-15T11:55:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T16:35:11+00:00",
"generator": {
"date": "2024-11-22T16:35:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:35:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3812
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3812",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T17:15:37+00:00",
"generator": {
"date": "2024-11-22T17:15:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3812",
"initial_release_date": "2021-10-12T15:19:06+00:00",
"revision_history": [
{
"date": "2021-10-12T15:19:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:19:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:15:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product_id": "kernel-0:3.10.0-957.84.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983686"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "RHBZ#1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
},
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky",
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3656",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "RHBZ#1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
RHSA-2021:3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3044
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3044",
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:54:29+00:00",
"generator": {
"date": "2024-11-15T11:54:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3044",
"initial_release_date": "2021-08-10T11:21:13+00:00",
"revision_history": [
{
"date": "2021-08-10T11:21:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T11:21:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:54:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021:3812
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3812",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:14+00:00",
"generator": {
"date": "2025-10-10T19:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3812",
"initial_release_date": "2021-10-12T15:19:06+00:00",
"revision_history": [
{
"date": "2021-10-12T15:19:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:19:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product_id": "kernel-0:3.10.0-957.84.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983686"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "RHBZ#1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
},
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky",
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3656",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "RHBZ#1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
RHSA-2021:3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:07+00:00",
"generator": {
"date": "2025-10-10T19:53:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3057
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3057",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3057",
"initial_release_date": "2021-08-10T13:19:09+00:00",
"revision_history": [
{
"date": "2021-08-10T13:19:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:19:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3088
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3088",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3088",
"initial_release_date": "2021-08-10T13:17:32+00:00",
"revision_history": [
{
"date": "2021-08-10T13:17:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:17:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
rhsa-2021_3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:39+00:00",
"generator": {
"date": "2024-11-15T11:55:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3812
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)\n\n* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3812",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3812.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:14+00:00",
"generator": {
"date": "2025-10-10T19:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3812",
"initial_release_date": "2021-10-12T15:19:06+00:00",
"revision_history": [
{
"date": "2021-10-12T15:19:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-12T15:19:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.src",
"product_id": "kernel-0:3.10.0-957.84.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.84.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.84.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.84.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.84.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983686"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (AVIC support)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "RHBZ#1983686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983686"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3653"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (AVIC support)"
},
{
"acknowledgments": [
{
"names": [
"Maxim Levitsky",
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3656",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2021-07-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "RHBZ#1983988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3656"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/08/16/1",
"url": "https://www.openwall.com/lists/oss-security/2021/08/16/1"
}
],
"release_date": "2021-08-16T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```\n\nDisabling VLS (Virtual VMLOAD/VMSAVE) is an alternative mitigation:\n```\n# modprobe kvm_amd vls=0\n```",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-12T15:19:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.84.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.84.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.84.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
opensuse-su-2021:2409-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2409",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2409-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2409-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2409-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:53Z",
"generator": {
"date": "2021-07-20T12:40:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2409-1",
"initial_release_date": "2021-07-20T12:40:53Z",
"revision_history": [
{
"date": "2021-07-20T12:40:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
opensuse-su-2021:2415-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nSecurity issues fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2415-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:11:51Z",
"generator": {
"date": "2021-07-20T14:11:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2415-1",
"initial_release_date": "2021-07-20T14:11:51Z",
"revision_history": [
{
"date": "2021-07-20T14:11:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product_id": "kernel-devel-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product_id": "kernel-macros-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product_id": "kernel-syms-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:11:51Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:11:51Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
opensuse-su-2021:1076-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).\n- CVE-2021-35039: kernel/module.c in the Linux kernel mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1076",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1076-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1076-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1076-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1180092",
"url": "https://bugzilla.suse.com/1180092"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188445",
"url": "https://bugzilla.suse.com/1188445"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T06:35:11Z",
"generator": {
"date": "2021-07-22T06:35:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1076-1",
"initial_release_date": "2021-07-22T06:35:11Z",
"revision_history": [
{
"date": "2021-07-22T06:35:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-devel-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-docs-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-docs-html-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-macros-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-source-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-source-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-debug-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-default-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product_id": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-preempt-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-syms-5.3.18-lp152.84.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-source-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "moderate"
}
],
"title": "CVE-2021-3612"
}
]
}
opensuse-su-2021:2427-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:28:39Z",
"generator": {
"date": "2021-07-21T09:28:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:28:39Z",
"revision_history": [
{
"date": "2021-07-21T09:28:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-3609"
}
]
}
fkie_cve-2021-22555
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cve-coordination@google.com | http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html | Third Party Advisory, VDB Entry | |
| cve-coordination@google.com | http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html | Exploit, Third Party Advisory, VDB Entry | |
| cve-coordination@google.com | http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html | Exploit, Third Party Advisory, VDB Entry | |
| cve-coordination@google.com | http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
| cve-coordination@google.com | http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html | Exploit, Third Party Advisory, VDB Entry | |
| cve-coordination@google.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 | Mailing List, Patch, Vendor Advisory | |
| cve-coordination@google.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d | Mailing List, Patch, Vendor Advisory | |
| cve-coordination@google.com | https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 | Exploit, Third Party Advisory | |
| cve-coordination@google.com | https://security.netapp.com/advisory/ntap-20210805-0010/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210805-0010/ | Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555 | US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| netapp | c400_firmware | - | |
| netapp | c400 | - | |
| netapp | c250_firmware | - | |
| netapp | c250 | - | |
| netapp | h410c_firmware | - | |
| netapp | h410c | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| brocade | fabric_operating_system | - | |
| netapp | fas_8300_firmware | - | |
| netapp | fas_8300 | - | |
| netapp | fas_8700_firmware | - | |
| netapp | fas_8700 | - | |
| netapp | aff_a400_firmware | - | |
| netapp | aff_a400 | - | |
| netapp | aff_a250_firmware | - | |
| netapp | aff_a250 | - | |
| netapp | aff_500f_firmware | - | |
| netapp | aff_500f | - | |
| netapp | h610c_firmware | - | |
| netapp | h610c | - | |
| netapp | h610s_firmware | - | |
| netapp | h610s | - | |
| netapp | h615c_firmware | - | |
| netapp | h615c | - | |
| netapp | cloud_backup | - | |
| netapp | hci_management_node | - | |
| netapp | solidfire | - | |
| netapp | solidfire_baseboard_management_controller | * |
{
"cisaActionDue": "2025-10-27",
"cisaExploitAdd": "2025-10-06",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Linux Kernel Heap Out-of-Bounds Write Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC7AD92-8B33-4137-A4EC-08641E4AF857",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD443748-B0D1-4C1A-A62E-BD5FB5967370",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1AB1EC2-2560-494A-A51B-6F20CE318FEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58DE2B52-4E49-4CD0-9310-00291B0352C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E869A37-B25A-4CFD-AFA1-964C540B7283",
"versionEndExcluding": "4.4.267",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1C60CB-5594-496C-8DF0-68D909707254",
"versionEndExcluding": "4.9.267",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1285CF4-6285-4288-9981-03A04F93519E",
"versionEndExcluding": "4.14.231",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46073F63-74D1-4675-999A-574C1C13B627",
"versionEndExcluding": "4.19.188",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3CE52D-3245-4B6C-9C92-897BCB496882",
"versionEndExcluding": "5.4.113",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0A42D4-2DAC-4DE0-A20B-A2700AA5E63A",
"versionEndExcluding": "5.10.31",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66C052DB-C48A-43D4-A1A8-AF1E331199D4",
"versionEndExcluding": "5.12",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41CD1160-B681-41EF-9EB4-06CE0F53C501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5CDADAB-72A5-4526-8432-E6C9AC56B29F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E64576DE-90F0-4F5E-9C82-AB745CFEDBB7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5AFE69-7990-4F80-9E63-D8AD58AA3A2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6415E28A-4EAC-4F7F-BD81-1A55CE8B6F40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56FD9B9A-BBE5-4CA5-B9F9-B16E1FE738C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E70A56-DBA8-45C7-8C49-1A036501156F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5DE972-F8B8-4964-943A-DA0BD18289D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B1F59C-6ADA-4930-834F-2A8A8444F6AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "578BB9A7-BF28-4068-A9A6-1DE19CEEC293",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB58180-E5E0-4056-ABF9-A99E9F6A9E86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:solidfire_baseboard_management_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D878165F-5C16-4376-8058-28787C9FF923",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
},
{
"lang": "es",
"value": "En el archivo net/netfilter/x_tables.c se ha detectado una escritura fuera de l\u00edmites en la pila que afecta a Linux desde la versi\u00f3n 2.6.19-rc1. Esto permite a un atacante alcanzar privilegios o causar una denegaci\u00f3n de servicio (por medio de corrupci\u00f3n de la memoria de la pila) mediante el espacio de nombres de usuario"
}
],
"id": "CVE-2021-22555",
"lastModified": "2025-10-27T17:06:32.497",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-07-07T12:15:08.453",
"references": [
{
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
wid-sec-w-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
WID-SEC-W-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
gsd-2021-22555
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-22555",
"description": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"id": "GSD-2021-22555",
"references": [
"https://www.suse.com/security/cve/CVE-2021-22555.html",
"https://access.redhat.com/errata/RHSA-2021:3814",
"https://access.redhat.com/errata/RHSA-2021:3812",
"https://access.redhat.com/errata/RHSA-2021:3725",
"https://access.redhat.com/errata/RHSA-2021:3523",
"https://access.redhat.com/errata/RHSA-2021:3522",
"https://access.redhat.com/errata/RHSA-2021:3477",
"https://access.redhat.com/errata/RHSA-2021:3399",
"https://access.redhat.com/errata/RHSA-2021:3381",
"https://access.redhat.com/errata/RHSA-2021:3380",
"https://access.redhat.com/errata/RHSA-2021:3375",
"https://access.redhat.com/errata/RHSA-2021:3363",
"https://access.redhat.com/errata/RHSA-2021:3328",
"https://access.redhat.com/errata/RHSA-2021:3327",
"https://access.redhat.com/errata/RHSA-2021:3321",
"https://access.redhat.com/errata/RHSA-2021:3235",
"https://access.redhat.com/errata/RHSA-2021:3181",
"https://access.redhat.com/errata/RHSA-2021:3173",
"https://access.redhat.com/errata/RHSA-2021:3088",
"https://access.redhat.com/errata/RHSA-2021:3057",
"https://access.redhat.com/errata/RHSA-2021:3044",
"https://ubuntu.com/security/CVE-2021-22555",
"https://security.archlinux.org/CVE-2021-22555",
"https://linux.oracle.com/cve/CVE-2021-22555.html",
"https://packetstormsecurity.com/files/cve/CVE-2021-22555"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-22555"
],
"details": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"id": "GSD-2021-22555",
"modified": "2023-12-13T01:23:24.536062Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2021-07-04T10:00:00.000Z",
"ID": "CVE-2021-22555",
"STATE": "PUBLIC",
"TITLE": "Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "2.6.19-rc1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Andy Nguyen"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"refsource": "MISC",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210805-0010/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"name": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.4.267",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.9.267",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.14.231",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.19.188",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.4.113",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.10.31",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.12",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2021-22555"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"name": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210805-0010/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"name": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-03-31T19:15Z",
"publishedDate": "2021-07-07T12:15Z"
}
}
}
cnvd-2021-48914
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528
| Name | Linux Linux kernel |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-22555"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8enet/netfilter/x_tables.c \u4e2d\u7684\u5806\u8d8a\u754c\u5199\u5165\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7528\u6237\u540d\u7a7a\u95f4\u83b7\u5f97\u6743\u9650\u6216\u5f15\u8d77DoS\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-48914",
"openTime": "2021-07-09",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8enet/netfilter/x_tables.c \u4e2d\u7684\u5806\u8d8a\u754c\u5199\u5165\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7528\u6237\u540d\u7a7a\u95f4\u83b7\u5f97\u6743\u9650\u6216\u5f15\u8d77DoS\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2021-48914\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"serverity": "\u4e2d",
"submitTime": "2021-07-09",
"title": "Linux kernel\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2021-48914\uff09"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.